• Title/Summary/Keyword: Access tree

Search Result 300, Processing Time 0.029 seconds

A Decomposition Algorithm for a Local Access Telecommunication Network Design Problem

  • Cho, Geon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.23 no.2
    • /
    • pp.29-46
    • /
    • 1998
  • In this paper, we develop detailed algorithms for implementing the so-called Limited Column Generation procedure for Local Access Telecommunication Network(LATN) design problem. We formulate the problem into a tree-partitioning problem with an exponential number of variables. Its linear programming relaxation has all integral vertices, and can be solved by the Limited Column Generation procedure in just n pivots, where n is the number of nodes in the network. Prior to each pivot. an entering variable is selected by detecting the Locally Most Violated(LMV) reduced cost, which can be obtained by solving a subproblem in pseudo-polynomial time. A critical step in the Limited Column Generation is to find all the LMV reduced costs. As dual variables are updated at each pivot, the reduced costs have to be computed in an on-line fashion. An efficient implementation is developed to execute such a task so that the LATN design problem can be solved in O(n$^2$H), where H is the maximum concentrator capacity. Our computational experiments indicate that our algorithm delivers an outstanding performance. For instance, the LATN design problem with n=150 and H=1000 can be solved in approximately 67 seconds on a SUN SPARC 1000 workstation.

  • PDF

A decomposition algorithm for local access telecommunication network design problem

  • Cho, Geon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.54-68
    • /
    • 1995
  • In this paper, we develop detailed algorithms for implementing the so-called Limited Column Generation procedure for Local Access Telecommunication Network (LATN) Design problem. We formulate the problem into a tree-partitioning problem with an exponential number of variables. Its linear programming relaxation has all integral vertices, and can be solved by the Limited Column. Generation procedure in just n pivots, where n is the number of nodes in the network. Prior to each pivot, an entering variable is selected by detecting the Locally Most Violated (LMV) reduced cost, which can be obtained by solving a subproblem in pseudo-polynomial time. A critical step in the Limited Column Generation is to find all the LMV reduced costs. As dual variables are updated at each pivot, the reduced costs have to be computed in an on-line fashion. An efficient implementation is developed to execute such a task so that the LATN Design problem can be solved in O(n$^{2}$H), where H is the maximum concentrator capacity. Our computational experiments indicate that our algorithm delivers an outstanding performance. For instance, the LATN Design problem with n = 150 and H = 1000 can be solved in approximately 67 seconds on a SUN SPARC 1000 workstation.

  • PDF

Design of Synchronization_Word Generator in a Bluetooth System (블루투스 동기워드 생성기의 구현)

  • Hwang, Sun-Won;Cho, Sung;Ahn, Jin-Woo;Lee, Sang-Hoon;Kim, Seong-Jeen
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.214-217
    • /
    • 2003
  • In this paper, we deal with implementing design for a correlator access code generator module which they are used for setting up a connection between units, a packet decision, a clock syncronization, by FPGA. The orrelator module which is composed of the Wallace Tree's CSA and threshold value decision device decides useful a packet and syncronizes a clock, after it correlates an input signal of 1 Mbps transmission rate by a sliding window. An access code generator module which is composed of a BCH (Bose-Chadhuri-Hocquenghem) cyclic encoder and control device was designed according as a four steps' generation process proposed in the bluetooth standard. The pseudo random sequence which solves syncronization problem saved a voluntary device Proposed the module was designed by VHDL. An simulation and test are inspected by Xilinx FPGA.

  • PDF

Video Indexing using Motion vector and brightness features (움직임 벡터와 빛의 특징을 이용한 비디오 인덱스)

  • 이재현;조진선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.4
    • /
    • pp.27-34
    • /
    • 1998
  • In this paper we present a method for automatic motion vector and brightness based video indexing and retrieval. We extract a representational frame from each shot and compute some motion vector and brightness based features. For each R-frame we compute the optical flow field; motion vector features are then derived from this flow field, BMA(block matching algorithm) is used to find motion vectors and Brightness features are related to the cut detection of method brightness histogram. A video database provided contents based access to video. This is achieved by organizing or indexing video data based on some set of features. In this paper the index of features is based on a B+ search tree. It consists of internal and leaf nodes stores in a direct access a storage device. This paper defines the problem of video indexing based on video data models.

  • PDF

An Efficient Attribute Certificate Management Technique for Highly Distributed Environment (고도로 분산된 컴퓨팅 환경을 위한 효율적 속성 인증서 관리 기법)

  • Yang, Soo-Mi
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.85-92
    • /
    • 2005
  • For an efficient role based access control in highly distributed computing environment to reduce management cost, we utilize attribute certificates. Especially highly distributed computing environments such as ubiquitous computing environments which cannot have global or broad control, need another attribute certificate management technique. The techniques for transmission of the attribute certificates and management of the group keys should be considered to reduce management cost. For better performance we structure attribute certificates. We group roles and make the role group relation tree. It results secure and efficient role renewing and distribution. For scalable attribute certificate distribution, multicasting packets are used. We take into account the packet loss and quantifying performance enhancements of structuring attribute certificates.

  • PDF

Study on Pressure Drop Optimization in Flow Channel with Two Diameters by Using Constructal Theory (형상법칙을 이용한 트리구조의 압력강하 최적화 연구)

  • Cho, Kee-Hyeon;Lee, Jae-Dal;Kim, Moo-Hwan
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.35 no.1
    • /
    • pp.1-8
    • /
    • 2011
  • An analytical study on the flow resistance of tree-shaped channel-flow architectures was carried out based on the principle of the constructal law; the evolutionary increase in the access to currents that flow through the channels with improvements in the flow configurations were studied in a square domain using two diameters. Two types of tree-shaped configurations were optimized. The minimized global flow resistance decreased steadily as the system size $N^2$ increased. From the two channel configurations, the one that resulted in better pressure drop was selected. Further, it was shown that the system performance can be enhanced by adopting the second tree-shaped configurations when the system size is greater than $18^2$.

Use of Information Technologies to Explore Correlations between Climatic Factors and Spontaneous Intracerebral Hemorrhage in Different Age Groups

  • Ting, Hsien-Wei;Chan, Chien-Lung;Pan, Ren-Hao;Lai, Robert K.;Chien, Ting-Ying
    • Journal of Computing Science and Engineering
    • /
    • v.11 no.4
    • /
    • pp.142-151
    • /
    • 2017
  • Spontaneous intracerebral hemorrhage (sICH) has a high mortality rate. Research has demonstrated that sICH occurrence is related to weather conditions; therefore, this study used the decision tree method to explore the impact of climatic risk factors on sICH at different ages. The Taiwan National Health Insurance Research Database (NHIRD) and other open-access data were used in this study. The inclusion criterion was a first-attack sICH. The decision tree algorithm and random forest were implemented in R programming language. We defined a high risk of sICH as more than the average number of cases daily, and the younger, middle-aged and older groups were calculated as having 0.77, 2.26 and 2.60 cases per day, respectively. In total, 22,684 sICH cases were included in this study; 3,102 patients were younger (<44 years, younger group), 9,089 were middle-aged (45-64 years, middle group), and 10,457 were older (>65 years, older group). The risk of sICH in the younger group was not correlated with temperature, wind speed or humidity. The middle group had two decision nodes: a higher risk if the maximum temperature was >$19^{\circ}C$ (probability = 63.7%), and if the maximum temperature was <$19^{\circ}C$ in addition to a wind speed <2.788 (m/s) (probability = 60.9%). The older group had a higher risk if the average temperature was >$23.933^{\circ}C$ (probability = 60.7%). This study demonstrated that the sICH incidence in the younger patients was not significantly correlated with weather factors; that in the middle-aged sICH patients was highly-correlated with the apparent temperature; and that in the older sICH patients was highly-correlated with the mean ambient temperature. "Warm" cold ambient temperatures resulted in a higher risk of sICH, especially in the older patients.

Optimal Number and Placement of Web Proxies in the Internet : The Linear & Tree Topology (인터넷으로 웹 프락시의 최적 개수와 위치 : 선형 구조와 트리구조)

  • Choi, Jung-Im;Chung, Haeng-Eun;Lee, Sang-Kyu;Moon, Bong-Hee
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.2
    • /
    • pp.229-235
    • /
    • 2001
  • With the explosive popularity of the World Wide Web, the low penonnance of network often leads web clients to wait a long time for web server's response. To resolve this problem, web caching (proxy) has been considered as the most efficient technique for web server to handle this problem. The placement of web proxy is critical to the overall penonnance, and Li et al. showed the optimal placement of proxies for a web server in the internet with the linear and tree topology when the number of proxies, ]M, is given [4, 5]. They focused on minimizing the over all access time. However, it is also considerable for target web server to minimize the total number of proxies while each proxy server guarantees not to exceed certain res(Xlnse time for each request from its clients. In this paper, we consider the problem of finding the optimal number and placement of web proxies with the lin~ar and tree topology under the given threshold cost for delay time.

  • PDF

A Multibit Tree Bitmap based Packet Classification (멀티 비트 트리 비트맵 기반 패킷 분류)

  • 최병철;이정태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.339-348
    • /
    • 2004
  • Packet classification is an important factor to support various services such as QoS guarantee and VPN for users in Internet. Packet classification is a searching process for best matching rule on rule tables by employing multi-field such as source address, protocol, and port number as well as destination address in If header. In this paper, we propose hardware based packet classification algorithm by employing tree bitmap of multi-bit trio. We divided prefixes of searching fields and rule into multi-bit stride, and perform a rule searching with multi-bit of fixed size. The proposed scheme can reduce the access times taking for rule search by employing indexing key in a fixed size of upper bits of rule prefixes. We also employ a marker prefixes in order to remove backtracking during searching a rule. In this paper, we generate two dimensional random rule set of source address and destination address using routing tables provided by IPMA Project, and compare its memory usages and performance.

A Network-based Indexing Method for Trajectories of Moving Objects on Roads (도로 위에 존재하는 이동객체의 궤적에 대한 네트워크 기반의 색인 방법)

  • Kim, Kyoung-Sook;Li, Ki-Joune
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.879-888
    • /
    • 2006
  • Recently many researchers have focused on management of Historical trajectories of moving objects in Euclidean spaces due to numerous sizes of accumulated data over time. However, the movement of moving objects in real applications generally has some constraints, for example vehicles on roads can only travel along connected road networks. In this paper, we propose an indexing method for trajectories of moving objects on road networks in order to process the network-based spatiotemporal range query. Our method contains the connect information of road networks to use the network distance for query processing, deals with trajectories which are represented by road segments in road networks, and manages them using multiple R-trees assigned per each road segment. Furthermore, it has a structure to be able to share R-tree among several road segments in large road networks. Consequently, we show that our method takes about 30% less in node accesses for the network-based spatiotemporal range query processing than other methods based on the Euclidean distance by experiments.